US 7249329 B1 Abstract Technology mapping techniques for determining whether a function can be implemented using an incomplete lookup table (LUT) are provided. For example, the output of a function is compared to the output of an incomplete LUT for each binary value of the function's input signals and for each binary value of the bits stored in the incomplete LUT. For a LUT that is functionally asymmetric, the process can be repeated for multiple permutations of the input signals with respect to the input terminals of the LUT. As another example, the user function is converted into a network of multiplexers and complete LUTs, which are analyzed to determine if an incomplete LUT can implement the function. As another example, a truth table is constructed for a function. The truth table variables are then tested one by one as candidates for each input position using co-factoring and dependency checking.
Claims(18) 1. A computer program product having computer program code stored on a computer readable medium that is configured to convert a circuit design into an equivalent circuit that includes incomplete lookup tables, the computer program product comprising:
code for identifying a function that is implemented by a portion of the circuit design, the function having input signals;
code for determining whether an incomplete lookup table implements the function in the circuit design, wherein the code for determining whether the incomplete lookup table implements the function in the circuit design further comprises:
code for comparing outputs of the function with outputs of the incomplete lookup table for each binary value of the input signals; and
code for determining if the incomplete lookup table generates the same outputs as the function for each of the binary values of the input signals; wherein the incomplete lookup table has N inputs and less than 2
^{N }bits of storage; andcode for replacing the portion of the circuit design that implements the function with the incomplete lookup table if the incomplete lookup table implements the function.
2. The computer program product according to
code for comparing outputs of the function with outputs of the incomplete lookup table using an XOR function, for each binary value of the input signals; and
code for evaluating outputs of the XOR functions using an OR function to determine if the incomplete lookup table generates the same outputs as the function for each of the binary values of the input signals.
3. The computer program product according to
code for creating a binary decision diagram for the XOR functions and the OR function; and
code for determining if a path exists through the binary decision diagram to a zero end point of the binary decision diagram.
4. The computer program product according to
code for swapping the input signals of the function with respect to the inputs of the incomplete lookup table, if the incomplete lookup table is asymmetric.
5. The computer program product according to
code for converting the function in the circuit design into a network of 2:1 multiplexers and complete lookup tables.
6. The computer program product according to
code for analyzing a software description of the circuit design to identify if-then-else statements in the description; and
code for replacing the if-then-else statements with the 2:1 multiplexers.
7. The computer program product according to
code for coupling conditions of the if-then-else statements to select inputs of the 2:1 multiplexers; and
code for determining if functions within blocks of the if-then-else statements are performed by complete lookup tables.
8. The computer program product according to
code for dividing the incomplete lookup table into a network 2:1 multiplexers and smaller complete lookup tables;
code for selecting a 2:1 multiplexer in the network;
code for proposing a signal from a truth table for the function to drive a select input of the selected 2:1 multiplexer;
code for splitting the truth table into 0 and 1 co-factors of the select signal; and
code for determining if the truth table depends on signals that are fed into the smaller complete lookup tables.
9. The computer program product according to
code for dividing the incomplete lookup table into a network 2:1 multiplexers and smaller complete lookup tables;
code for selecting a 2:1 multiplexer in the network;
code for proposing a signal from a binary decision diagram (BDD) for the function to drive a select input of the selected 2:1 multiplexer;
code for splitting the BDD into 0 and 1 co-factors of the select signal; and
code for determining if the BDD depends on signals that are fed into the smaller complete lookup tables.
10. The computer program product according to
11. A method for converting a circuit design into an equivalent circuit that includes incomplete lookup tables, the method comprising:
identifying a function that is implemented by a portion of the circuit design, the function having input signals;
determining whether an incomplete lookup table (LUT) implements the function in the circuit design, wherein determining whether the incomplete LUT implements the function further comprises:
comparing outputs of the function with outputs of the incomplete LUT for each binary value of the input signals; and
determining if the incomplete LUT generates the same outputs as the function for each of the binary values of the input signals, wherein the incomplete LUT has N inputs and less than 2
^{N }bits of storage; andreplacing the portion of the circuit design that implements the function with the incomplete LUT if the incomplete LUT implements the function.
12. The method defined in
comparing outputs of the function with outputs of the incomplete LUT using an XOR function, for each binary value of the input signals;
evaluating outputs of the XOR functions using an OR function to determine if the incomplete LUT generates the same outputs as the function for each of the binary values of the input signals;
creating a binary decision diagram for the XOR functions and the OR function; and
determining if a path exists through the binary decision diagram to a zero end point of the binary decision diagram.
13. The method defined in
swapping the input signals of the function with respect to the inputs of the incomplete LUT, if the incomplete LUT is asymmetric.
14. The method defined in
converting the function in the circuit design into a network of 2:1 multiplexers and complete lookup tables.
15. The method defined in
dividing the incomplete lookup table into a network 2:1 multiplexers and smaller complete lookup tables;
selecting a 2:1 multiplexer in the network;
proposing a signal from a truth table for the function to drive a select input of the selected 2:1 multiplexer;
splitting the truth table into 0 and 1 co-factors of the select signal; and
determining if the truth table depends on signals that can be fed into the smaller complete lookup tables.
16. The method defined in
dividing the incomplete lookup table into a network 2:1 multiplexers and smaller complete lookup tables;
selecting a 2:1 multiplexer in the network;
proposing a signal from a binary decision diagram (BDD) for the function to drive a select input of the selected 2:1 multiplexer;
splitting the BDD into 0 and 1 co-factors of the select signal; and
determining if the BDD depends on signals that are fed into the smaller complete lookup tables.
17. The method defined in
placing the circuit design including the incomplete LUT on a programmable logic integrated circuit.
18. A system for determining whether an incomplete lookup table (LUT) implements a function, wherein the incomplete LUT has N inputs and less than 2
^{N }bits of storage, the system comprising:
means for comparing outputs of the function with outputs of the incomplete LUT using an XOR function, for each binary value of the input signals;
means for evaluating outputs of the XOR functions using an OR function to determine if the incomplete LUT generates the same outputs as the function for each of the binary values of the input signals;
means for creating a binary decision diagram for the XOR functions and the OR function;
means for determining if a path exists through the binary decision diagram to a zero end point of the binary decision diagram; and
means for swapping the input signals of the function with respect to the inputs of the incomplete lookup table, if the incomplete lookup table is asymmetric.
Description The present invention relates to technology mapping techniques for incomplete look-up tables, and more particularly, to techniques for determining functions in a circuit design can be implemented by incomplete lookup tables. A lookup table is a memory circuit that stores binary bits of information. A lookup table can emulate a logic function that generates output values in response to receiving values of input signals. Each possible output of the logic function is stored in the lookup table at a memory address that matches corresponding values of the input signals. A lookup table (LUT) can have any number of input terminals that receive input signals. A complete LUT has enough memory to store every (2 The term “incomplete LUT” is used to refer to a LUT that has less than 2 Many reasonable configurations for incomplete LUTs have been made. For example, a 5 input incomplete LUT can be made from two 3 input LUTs and a multiplexer. The 3 input LUTs have two shared input signals. The fifth input signal controls the select terminal of the multiplexer. The multiplexer has two inputs that are coupled to the outputs of the LUTs. A 7 input incomplete LUT can also be built from two 3 input LUTs and a multiplexer. The two 3 input LUTs have no shared input signals. The seventh input signal controls the select terminal of the multiplexer. The multiplexer has two inputs that are coupled to the outputs of the LUTs. A different 7 input incomplete LUT can be built from a 5 LUT feeding a multiplexer. The LUT and sixth input signal feed the two data terminals of the multiplexer. The seventh input feeds the select terminal of the multiplexer.” The number of functions that a LUT can implement equals 2 The amount of area that is required to built a LUT on a silicon chip is proportional to the storage space in the LUT. An incomplete LUT uses far less silicon area than a complete LUT that has the same number of inputs, because incomplete LUTs have less storage space. Technology mapping is a term that refers to the process of converting an arbitrary circuit design into an equivalent circuit that can be programmed onto a programmable integrated circuit such as field programmable gate array (FPGA). Most FPGAs use LUTs to implement logic functions. Technology mapping algorithms convert a circuit design into a network of available LUTs and other programmable circuit elements. Traditional technology mapping algorithms operate on the assumption that all LUTs are complete in the sense described above. Such traditional algorithms assume, for example, that any 5 input function can be implemented in a 5 input LUT. However, it may not be possible to implement a 5 input logic function in an incomplete 5 input LUT. An incomplete 5 input LUT may not have enough memory storage space to store all of the possible output values of a 5 input function. It would be desirable to use incomplete LUTs in technology mapping tools, because incomplete LUTs can implement functions using less storage space than complete LUTs having the same number of inputs. Therefore, it would be desirable to provide technology mapping techniques that determine whether functions in a circuit design can be fully implemented using incomplete LUTs. The present invention provides technology mapping techniques for determining whether a function can be implemented using an incomplete lookup table (LUT). According to one embodiment of the present invention, the output of a function is compared directly to the output of an incomplete LUT using an exclusive OR (XOR) gate. The comparison is repeated for each binary value of the function's input signals. The outputs of each comparison are evaluated by an OR gate. The process can be repeated for each possible binary value of the bits stored in the incomplete LUT. For a LUT that is functionally asymmetric, the process is repeated for multiple rotations of the input signals with respect to the input terminals of the LUT. According to another embodiment of the present invention, the user function is converted into a network of 2:1 multiplexers and complete LUTs. The network is then analyzed directly by a process to determine if a specific incomplete LUT can implement the function. According to yet another embodiment of the present invention, a truth table is constructed for a function. The truth table variables are then tested one by one as candidates for each input position using two types of operations. The operations include co-factoring and dependency checking. Co-factoring is splitting the truth table into two halves corresponding to a given variable being high and low. Dependency checking is testing whether the value of a given variable effects the output of a truth table. This embodiment can also be performed using a binary decision diagram (BDD) instead of a truth table. Other objects, features, and advantages of the present invention will become apparent upon consideration of the following detailed description and the accompanying drawings, in which like reference designations represent like features throughout the figures. According to a first embodiment of the present invention, a test procedure compares the outputs of an arbitrary function with the outputs of an incomplete lookup table (LUT) to determine if the LUT can implement the function. The incomplete LUT is tested for every binary value of the input signal and every binary value of the bits stored in the LUT's memory to determine if the LUT can implement the function. System Both LUT XOR gate LUT LUT The output signals of the 8 XOR gates If the output of OR gate The test system shown and described with respect to According to an embodiment of the present invention, the output of an incomplete LUT are compared to the output of a function for each binary value of the input signals, as shown for example in Each round node in the BDD represents a storage bit in the incomplete LUT. The square end points of the BDD represent the possible values of the OR gate Each complete path from the starting point (bit Another possible path from bit If the BDD for a test system does not have a valid path to a zero end point output for the OR gate, and the incomplete LUT is a symmetric LUT, then the incomplete LUT cannot implement the function. However, an incomplete LUT that is asymmetrical may generate different sets of functions depending on how the input signals are coupled to its input terminals. For example, LUT In the event that OR gate After input signals A, B, and C have been permutated, a new BDD is constructed for the test system to determine if any values of bit If no valid path exists through the BDD to a zero end point, incomplete LUT After input signals A, B, and C have been permutated again, a new BDD is constructed for the test system to determine if any values of bit If no valid path exists through the BDD to a zero end point, incomplete LUT Input signals in portions of an incomplete LUT that are symmetric do not need to be permutated. For example, if LUT XOR gate User function Some of the input signals can be duplicated on more than one input of LUT The test system of The test system of A BDD is constructed to represent the test system that includes XOR gates and the OR gate that tests each binary value of the function's input signals. All valid paths through the BDD to the zero end point represent the binary values for the dummy variables d If there is not valid path through the BDD to the zero end point, the input signals A-G are permutated with respect to the input terminals of LUT The tests can be repeated for each possible permutation of the input signals with respect to the input terminals of LUT At step At decisional step If the incomplete LUT is asymmetric, the input signals are permutated with respect to the input terminals of the incomplete LUT at step The structure of software that implements the embodiment of Modern circuits are typically implemented in a hardware description language (HDL). These languages usually have the “if-then-else” code structure. The if-then-else code structures can naturally be implemented in 2:1 multiplexers. An incomplete LUT can always be viewed as a network of 2:1 multiplexers fed by inputs and smaller complete LUTs. Programmers often rely on the if-then-else structure to characterize numerous types of functions in their circuit designs. The fact that programmers frequently use the if-then-else structure makes it very natural to match up portions of a user HDL design with incomplete LUTs. The present invention includes other embodiments for determining whether an incomplete LUT can implement a function. One of these embodiments analyzes software code (e.g., in an HDL) that describes a circuit design that includes functions. A synthesis tool converts the software code for a function in the design into a network of multiplexers and smaller complete LUTs. The present invention then determines whether the network of multiplexers and complete LUTs can be implemented by an incomplete LUT on the FPGA that has the same or a larger number of inputs. This technique is referred to as pattern matching on the input netlist. The netlist refers to the software code that describes a circuit design. The following software Code A will be used as an example of this embodiment. Code A implements a function Code A: -
- If (M
**3**)- OUT=M
**2**
- OUT=M
- Else
- OUT=M
**2**or M**1**
- OUT=M
- END IF
- If (M
A synthesis and technology mapping tool such as Quartus II can convert Code A into a network of multiplexers and smaller LUTs using well known techniques. The output of this conversion is network The present invention can analyze network
Software procedure B is merely an example that is provided for illustrative purposes and is not intended to limit the scope of the present invention. According to the present invention, numerous other procedures are possible for determining whether an incomplete LUT can implement a network of multiplexers and smaller complete LUTs. The pattern matching can be updated to work with any new LUT structure. Procedure B is now described in further detail. For each gate in network If there is a source gate with 2 inputs that feeds the Y input of multiplexer Nesting of if-then-else blocks in user HDL programs is also very common. The nesting of if-then-else blocks leads to trees of multiplexers that also can be mapped into incomplete LUTs using the techniques of the present invention. The following Code C provides an example of the how the present invention can map a function described in a nested if-then statement into an incomplete LUT. Code C: -
- If (condition 1)
- If (condition 2)
- OUT=A
- Else
- OUT=B
- END IF
- If (condition 2)
- ELSE
- OUT=C
- END IF
- If (condition 1)
The present invention can easily convert Code C into two 2:1 multiplexers, where the first multiplexer is coupled to an input of the second multiplexer. Inputs A and B feed into the first multiplexer, and input C feeds into the second multiplexer. The select input of the first multiplexer is controlled by condition 1, and the select input of the second multiplexer is controlled by condition 2. Any arrangement of if-then-else statements can be converted into a desirable multiplexer implementation. For example, moving the block under condition 2 in Code C down to the else half of the first If-Else block produces a symmetric 2 multiplexer result. Adding another If block at any point in the example adds a third multiplexer, but does not disturb the suitability of the code for an incomplete 5 input LUT. An advantage of this embodiment of the present invention is that the procedures (such as procedure B) are extremely fast to execute. Procedure B, for example, constructs the appropriate ordering for the A, B, and C LUT inputs rather than needing to explore all binary values of the inputs as with the A disadvantage of this embodiment is the fact that the procedures (such as procedure B) that determine whether an incomplete LUT can implement the function have to be customized for every incomplete LUT. Also, there are many functions that can be implemented in an incomplete LUT, but that are not expressed by a particular conversion procedure such as procedure B. For incomplete LUTs that have a large number of inputs, it becomes less feasible to implement some of the embodiments of the present invention, because the runtime burden increases exponentially with increasing inputs. However, the runtime of the The present invention can also recognize common sub-circuits at the HDL level and replace the sub-circuits directly with technology mapped equivalents. For example, the software can recognize an 8:1 multiplexer function and replace it with two 5 input LUTs implementing 3:1 multiplexers followed by an incomplete 7 input LUT implementing the selection between the two 3:1 multiplexers and the other two data elements. The code used is very similar to the example above. The difference is that logic is selected to be implemented in an incomplete LUT as well as two complete LUTs instead of targeting a single incomplete LUT. Another embodiment of the present invention for determining whether an incomplete LUT can implement a function is now described. This embodiment has the advantage of being able to recognize all functions that can be implemented by a particular type of incomplete LUT. According to this embodiment, a truth table is constructed for the function under consideration. The truth table variables are tested one by one as candidates for each input position using two types of operations. The operations involved include co-factoring and dependency checking. Co-factoring involves splitting a truth table into two halves corresponding to a given variable being high and low. Dependency checking involves testing whether the value of a given variable effects the output of a truth table. For example, if the co-factors for a variable are equal, the function does not depend on that variable. The following generic code is one example of a procedure that can determine whether LUT
The appropriate LUT storage contents can be computed from the V=0 co-factor truth table. The LUT storage contents need to be customized for each different incomplete LUT. A more general methodology for determining whether an incomplete LUT can implement a function using a truth table is shown in At step At step At decisional step An example of a specific process for implementing this embodiment for incomplete 9 input LUT According to this example process, a truth table is built for a function in a user circuit that has up to 9 inputs. For each input signal S of the function, a co-factor of the complete 9 input truth table is built for the case where S=0. The S=0 co-factor truth table is checked for dependency on 4 or fewer variables. If the S=0 co-factor truth table depends on more than 4 variables, the process skips ahead to the next S input signal. For each input signal S of the function, a co-factor of the complete 9 input truth table is built for the case were S=1. The S=1 co-factor truth table is checked for dependency on 4 or fewer variables. If the S=0 co-factor truth table depends on more than 4 variables, the process skips ahead to the next S input signal. If the process has not skipped the first S input signal because the S=0 and the S=1 co-factor truth tables each depend on 4 or less variables, the incomplete 9 input LUT can implement the function. The S=1 co-factor truth table is applied to one of the 4 input complete LUTs, and the S=0 co-factor truth table is applied to the second 4 input complete LUT. The S input signal that lead to the solution is applied to the select terminal of the 2:1 multiplexer. If the first iteration of the process fails, the process considers all of the other S input signals to determine if a solution can be found. According to another embodiment of the present invention, the truth table embodiment is implemented using binary decision diagram (BDD) operations instead of a truth table. Co-factoring a variable is equivalent to rotating that variable to the top of the BDD and considering the high and low branches of the BDD that correspond to high and low co-factors, as described above. Thus, the 1 and the 0 co-factors of a variable of a function are the high and low branches of the BDD. Dependency checking is implemented in a BDD by traversing down the BDD tree looking for a node on that variable's level. The variables can be reordered or rotated into any order. The coding complexity and runtime of this embodiment of roughly equivalent to the truth table embodiment. The techniques of the present invention can be used as part of a technology mapping process to convert a circuit design into a network of LUTs and other circuit elements that can be programmed into a programmable logic integrated circuit. Programmable logic integrated circuits include programmable logic devices (PLDs), field programmable gate arrays (FPGAs), programmable logic arrays, configurable logic arrays, etc. An LE is a programmable logic block that provides for efficient implementation of user defined logic functions. PLD PLD PLD While PLDs of the type shown in System Processing unit For example, instead of a CPU, one or more PLDs While the present invention has been described herein with reference to particular embodiments thereof, a latitude of modification, various changes, and substitutions are intended in the present invention. In some instances, features of the invention can be employed without a corresponding use of other features, without departing from the scope of the invention as set forth. Therefore, many modifications may be made to adapt a particular configuration or method disclosed, without departing from the essential scope and spirit of the present invention. It is intended that the invention not be limited to the particular embodiments disclosed, but that the invention will include all embodiments and equivalents falling within the scope of the claims. Patent Citations
Non-Patent Citations
Referenced by
Classifications
Legal Events
Rotate |